SlideShare a Scribd company logo
1 of 1
Download to read offline
239-522 - Bio-Key : Privacy Preserving Biometric Authentication - Matthew Young - IAP




           Bio-Key : Privacy Preserving Biometric Authentication
                          E.          S.                    Bertino1,
                                                                    M.           S.     Elliott2,   A.Bhargav-Spantzel 1,        Young 2,         Modi 2,A.      Squicciarini 1

                     1Department of Computer Science, 2Department of Industrial Technology. Purdue University



                Goals & Advantages:
                                                                                                                      Bio-Key Lifecycle:
                • The goal is to provide a privacy preserving methodology
                for strong biometric authentication in federated identity
                management systems.
                • Privacy Preserving Multifactor Authentication [1]:
                multifactor authentication is essential for secure
                authentication mechanisms. The identity management
                framework is used to provide proofs of multiple strong
                identifiers for a given user.
                • Interoperability: Our scheme provides an interoperable,
                usable, secure, and inexpensive to use biometric
                authentication in a federation.
                • User Control : The raw biometric never leaves the client
                machine therefore providing complete control to its owner.




                                                                                                                       Bio-Key Transformation:




                                       ID Attributes:                                                                 • Sensor / Raw Image / Feature Extraction / Vector Creation


                                                                                                                     Collaboration Through CERIAS:
                                                                                                                     • Department of Computer Science
                                                                                                                     • Biometric Standards, Performance & Assurance (BSPA)
                                                                                                                     Laboratory (Department of Industrial Technology)
                                                                                                                     Reference:
                                                                                                                     [1] A. B. Spantzel, A. C. Squicciarini, E. Bertino. Establishing and
                                                                                                                     Protecting Digital Identity in Federation System. In proceedings of
                                                                                                                     ACM CCS workshop on Digital Identity Management .




239-522.pdf 1                                                                                                                                                                               3/5/2007 2:32:34 PM

More Related Content

What's hot

Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASH
Akash Deep Maurya
 
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
CSCJournals
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
Dharmik
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD Editor
 
A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...
A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...
A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...
Editor IJCATR
 
Managing PIV Card Lifecycle and Converging Physical & Logical Access Control
Managing PIV Card Lifecycle and Converging Physical & Logical Access ControlManaging PIV Card Lifecycle and Converging Physical & Logical Access Control
Managing PIV Card Lifecycle and Converging Physical & Logical Access Control
Ramesh Nagappan
 

What's hot (18)

Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASH
 
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
 
Biometric Authentication Based on Hash Iris Features
Biometric Authentication Based on Hash Iris FeaturesBiometric Authentication Based on Hash Iris Features
Biometric Authentication Based on Hash Iris Features
 
Ins & Outs of Biometric Authentication
Ins & Outs of Biometric AuthenticationIns & Outs of Biometric Authentication
Ins & Outs of Biometric Authentication
 
Ubiquitous security- is it just biometrics?
Ubiquitous security- is it just biometrics?Ubiquitous security- is it just biometrics?
Ubiquitous security- is it just biometrics?
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniques
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...
A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...
A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...
 
biometrics and cyber security
biometrics and cyber securitybiometrics and cyber security
biometrics and cyber security
 
“Enhancing Iris Scanning Using Visual Cryptography”
“Enhancing Iris Scanning Using Visual Cryptography”“Enhancing Iris Scanning Using Visual Cryptography”
“Enhancing Iris Scanning Using Visual Cryptography”
 
Managing PIV Card Lifecycle and Converging Physical & Logical Access Control
Managing PIV Card Lifecycle and Converging Physical & Logical Access ControlManaging PIV Card Lifecycle and Converging Physical & Logical Access Control
Managing PIV Card Lifecycle and Converging Physical & Logical Access Control
 
Jss academy of technical education
Jss academy of technical educationJss academy of technical education
Jss academy of technical education
 
Biometrics
BiometricsBiometrics
Biometrics
 
MULTIMODAL BIOMETRIC SECURITY SYSTEM
MULTIMODAL BIOMETRIC SECURITY  SYSTEMMULTIMODAL BIOMETRIC SECURITY  SYSTEM
MULTIMODAL BIOMETRIC SECURITY SYSTEM
 
Biometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learningBiometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learning
 
Bio shiv
Bio shivBio shiv
Bio shiv
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 

Viewers also liked

15. combining rational expressions castouchpad
15. combining rational expressions castouchpad15. combining rational expressions castouchpad
15. combining rational expressions castouchpad
Media4math
 
Waste Arrangements Christmas 2011
Waste Arrangements Christmas 2011Waste Arrangements Christmas 2011
Waste Arrangements Christmas 2011
Naoise
 
Quantificação e correlação entre incidência de gols e potência muscular (acbf...
Quantificação e correlação entre incidência de gols e potência muscular (acbf...Quantificação e correlação entre incidência de gols e potência muscular (acbf...
Quantificação e correlação entre incidência de gols e potência muscular (acbf...
Jose Augusto Leal
 
елки 2
елки 2елки 2
елки 2
kirleer
 
60 anos de FGV-EAESP
60 anos de FGV-EAESP60 anos de FGV-EAESP
60 anos de FGV-EAESP
FGV-EAESP
 
03 bo tri mat bang khoi be-layout1 c
03 bo tri mat bang khoi be-layout1 c03 bo tri mat bang khoi be-layout1 c
03 bo tri mat bang khoi be-layout1 c
honhung
 
RYUS通信 2011年10月号
RYUS通信 2011年10月号RYUS通信 2011年10月号
RYUS通信 2011年10月号
株式会社RYUS
 
Evaris Peter Resume Word
Evaris Peter Resume WordEvaris Peter Resume Word
Evaris Peter Resume Word
Evaris_Peter
 

Viewers also liked (20)

15. combining rational expressions castouchpad
15. combining rational expressions castouchpad15. combining rational expressions castouchpad
15. combining rational expressions castouchpad
 
Waste Arrangements Christmas 2011
Waste Arrangements Christmas 2011Waste Arrangements Christmas 2011
Waste Arrangements Christmas 2011
 
付出與收穫1
付出與收穫1付出與收穫1
付出與收穫1
 
Logo warna unsa
Logo warna unsaLogo warna unsa
Logo warna unsa
 
Quantificação e correlação entre incidência de gols e potência muscular (acbf...
Quantificação e correlação entre incidência de gols e potência muscular (acbf...Quantificação e correlação entre incidência de gols e potência muscular (acbf...
Quantificação e correlação entre incidência de gols e potência muscular (acbf...
 
Presup caico2012
Presup caico2012Presup caico2012
Presup caico2012
 
Pilgrimage to makkah
Pilgrimage to makkahPilgrimage to makkah
Pilgrimage to makkah
 
Natal leah 01
Natal leah 01Natal leah 01
Natal leah 01
 
Auguri da - Seasons Greetings from ANTOITALIA
Auguri da - Seasons Greetings from ANTOITALIAAuguri da - Seasons Greetings from ANTOITALIA
Auguri da - Seasons Greetings from ANTOITALIA
 
Pc250033
Pc250033Pc250033
Pc250033
 
"...Court orders service by email..."
"...Court orders service by email...""...Court orders service by email..."
"...Court orders service by email..."
 
Killed unjustly
Killed unjustlyKilled unjustly
Killed unjustly
 
елки 2
елки 2елки 2
елки 2
 
CV Alisson P.O.
CV Alisson P.O.CV Alisson P.O.
CV Alisson P.O.
 
60 anos de FGV-EAESP
60 anos de FGV-EAESP60 anos de FGV-EAESP
60 anos de FGV-EAESP
 
03 bo tri mat bang khoi be-layout1 c
03 bo tri mat bang khoi be-layout1 c03 bo tri mat bang khoi be-layout1 c
03 bo tri mat bang khoi be-layout1 c
 
RYUS通信 2011年10月号
RYUS通信 2011年10月号RYUS通信 2011年10月号
RYUS通信 2011年10月号
 
Evaris Peter Resume Word
Evaris Peter Resume WordEvaris Peter Resume Word
Evaris Peter Resume Word
 
Educação -joão_ubaldo._-_pps
Educação  -joão_ubaldo._-_ppsEducação  -joão_ubaldo._-_pps
Educação -joão_ubaldo._-_pps
 
Eakate funktsionaalne toimetulek
Eakate funktsionaalne toimetulekEakate funktsionaalne toimetulek
Eakate funktsionaalne toimetulek
 

Similar to (2007) BioKey - Privacy Preserving Biometric Authentication

(2007) Privacy Preserving Multi-Factor Authentication with Biometrics
(2007) Privacy Preserving Multi-Factor Authentication with Biometrics(2007) Privacy Preserving Multi-Factor Authentication with Biometrics
(2007) Privacy Preserving Multi-Factor Authentication with Biometrics
International Center for Biometric Research
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
Agrani Rastogi
 
Privacypreservingauthenticationbiometrics 100228075830-phpapp02
Privacypreservingauthenticationbiometrics 100228075830-phpapp02Privacypreservingauthenticationbiometrics 100228075830-phpapp02
Privacypreservingauthenticationbiometrics 100228075830-phpapp02
Hai Nguyen
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
Sampat Patnaik
 
Zahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense SlidesZahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense Slides
Pluribus One
 
Implementation of Multimodal Biometrics Systems in Handling Security of Mobil...
Implementation of Multimodal Biometrics Systems in Handling Security of Mobil...Implementation of Multimodal Biometrics Systems in Handling Security of Mobil...
Implementation of Multimodal Biometrics Systems in Handling Security of Mobil...
ijtsrd
 

Similar to (2007) BioKey - Privacy Preserving Biometric Authentication (20)

(2007) Privacy Preserving Multi-Factor Authentication with Biometrics
(2007) Privacy Preserving Multi-Factor Authentication with Biometrics(2007) Privacy Preserving Multi-Factor Authentication with Biometrics
(2007) Privacy Preserving Multi-Factor Authentication with Biometrics
 
BSI Biometrics Standards Brochure
BSI Biometrics Standards BrochureBSI Biometrics Standards Brochure
BSI Biometrics Standards Brochure
 
Feature Level Fusion of Multibiometric Cryptosystem in Distributed System
Feature Level Fusion of Multibiometric Cryptosystem in Distributed SystemFeature Level Fusion of Multibiometric Cryptosystem in Distributed System
Feature Level Fusion of Multibiometric Cryptosystem in Distributed System
 
bioChec Overview
bioChec OverviewbioChec Overview
bioChec Overview
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Biometrics security
Biometrics securityBiometrics security
Biometrics security
 
Enhancing Security and Efficiency The Power of Biometric Access Control Systems
Enhancing Security and Efficiency The Power of Biometric Access Control SystemsEnhancing Security and Efficiency The Power of Biometric Access Control Systems
Enhancing Security and Efficiency The Power of Biometric Access Control Systems
 
Privacypreservingauthenticationbiometrics 100228075830-phpapp02
Privacypreservingauthenticationbiometrics 100228075830-phpapp02Privacypreservingauthenticationbiometrics 100228075830-phpapp02
Privacypreservingauthenticationbiometrics 100228075830-phpapp02
 
Fingerprint Attendance project final PPT
Fingerprint Attendance project final PPTFingerprint Attendance project final PPT
Fingerprint Attendance project final PPT
 
ISSA Web Conference - Biometric Information Security Management
ISSA Web Conference - Biometric Information Security ManagementISSA Web Conference - Biometric Information Security Management
ISSA Web Conference - Biometric Information Security Management
 
Privacy Preserving Biometrics-Based and User Centric Authentication Protocol
Privacy Preserving Biometrics-Based and User Centric Authentication ProtocolPrivacy Preserving Biometrics-Based and User Centric Authentication Protocol
Privacy Preserving Biometrics-Based and User Centric Authentication Protocol
 
Biometric encryption
Biometric encryptionBiometric encryption
Biometric encryption
 
Biometric Systems
Biometric SystemsBiometric Systems
Biometric Systems
 
A secure Crypto-biometric verification protocol
A secure Crypto-biometric verification protocol A secure Crypto-biometric verification protocol
A secure Crypto-biometric verification protocol
 
I017335457
I017335457I017335457
I017335457
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
 
Zahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense SlidesZahid Akhtar - Ph.D. Defense Slides
Zahid Akhtar - Ph.D. Defense Slides
 
Biometrics
BiometricsBiometrics
Biometrics
 
Implementation of Multimodal Biometrics Systems in Handling Security of Mobil...
Implementation of Multimodal Biometrics Systems in Handling Security of Mobil...Implementation of Multimodal Biometrics Systems in Handling Security of Mobil...
Implementation of Multimodal Biometrics Systems in Handling Security of Mobil...
 
Cloud Computing security Challenges for Defense Forces
Cloud Computing security Challenges for Defense ForcesCloud Computing security Challenges for Defense Forces
Cloud Computing security Challenges for Defense Forces
 

More from International Center for Biometric Research

Best Practices in Reporting Time Duration in Biometrics
Best Practices in Reporting Time Duration in BiometricsBest Practices in Reporting Time Duration in Biometrics
Best Practices in Reporting Time Duration in Biometrics
International Center for Biometric Research
 

More from International Center for Biometric Research (20)

HBSI Automation Using the Kinect
HBSI Automation Using the KinectHBSI Automation Using the Kinect
HBSI Automation Using the Kinect
 
IT 34500
IT 34500IT 34500
IT 34500
 
An Investigation into Biometric Signature Capture Device Performance and User...
An Investigation into Biometric Signature Capture Device Performance and User...An Investigation into Biometric Signature Capture Device Performance and User...
An Investigation into Biometric Signature Capture Device Performance and User...
 
Entropy of Fingerprints
Entropy of FingerprintsEntropy of Fingerprints
Entropy of Fingerprints
 
Biometric and usability
Biometric and usabilityBiometric and usability
Biometric and usability
 
Examining Intra-Visit Iris Stability - Visit 4
Examining Intra-Visit Iris Stability - Visit 4Examining Intra-Visit Iris Stability - Visit 4
Examining Intra-Visit Iris Stability - Visit 4
 
Examining Intra-Visit Iris Stability - Visit 6
Examining Intra-Visit Iris Stability - Visit 6Examining Intra-Visit Iris Stability - Visit 6
Examining Intra-Visit Iris Stability - Visit 6
 
Examining Intra-Visit Iris Stability - Visit 2
Examining Intra-Visit Iris Stability - Visit 2Examining Intra-Visit Iris Stability - Visit 2
Examining Intra-Visit Iris Stability - Visit 2
 
Examining Intra-Visit Iris Stability - Visit 1
Examining Intra-Visit Iris Stability - Visit 1Examining Intra-Visit Iris Stability - Visit 1
Examining Intra-Visit Iris Stability - Visit 1
 
Examining Intra-Visit Iris Stability - Visit 3
Examining Intra-Visit Iris Stability - Visit 3Examining Intra-Visit Iris Stability - Visit 3
Examining Intra-Visit Iris Stability - Visit 3
 
Best Practices in Reporting Time Duration in Biometrics
Best Practices in Reporting Time Duration in BiometricsBest Practices in Reporting Time Duration in Biometrics
Best Practices in Reporting Time Duration in Biometrics
 
Examining Intra-Visit Iris Stability - Visit 5
Examining Intra-Visit Iris Stability - Visit 5Examining Intra-Visit Iris Stability - Visit 5
Examining Intra-Visit Iris Stability - Visit 5
 
Standards and Academia
Standards and AcademiaStandards and Academia
Standards and Academia
 
Interoperability and the Stability Score Index
Interoperability and the Stability Score IndexInteroperability and the Stability Score Index
Interoperability and the Stability Score Index
 
Advances in testing and evaluation using Human-Biometric sensor interaction m...
Advances in testing and evaluation using Human-Biometric sensor interaction m...Advances in testing and evaluation using Human-Biometric sensor interaction m...
Advances in testing and evaluation using Human-Biometric sensor interaction m...
 
Cerias talk on testing and evaluation
Cerias talk on testing and evaluationCerias talk on testing and evaluation
Cerias talk on testing and evaluation
 
IT 54500 overview
IT 54500 overviewIT 54500 overview
IT 54500 overview
 
Ben thesis slideshow
Ben thesis slideshowBen thesis slideshow
Ben thesis slideshow
 
(2010) Fingerprint recognition performance evaluation for mobile ID applications
(2010) Fingerprint recognition performance evaluation for mobile ID applications(2010) Fingerprint recognition performance evaluation for mobile ID applications
(2010) Fingerprint recognition performance evaluation for mobile ID applications
 
ICBR Databases
ICBR DatabasesICBR Databases
ICBR Databases
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Recently uploaded (20)

Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 

(2007) BioKey - Privacy Preserving Biometric Authentication

  • 1. 239-522 - Bio-Key : Privacy Preserving Biometric Authentication - Matthew Young - IAP Bio-Key : Privacy Preserving Biometric Authentication E. S. Bertino1, M. S. Elliott2, A.Bhargav-Spantzel 1, Young 2, Modi 2,A. Squicciarini 1 1Department of Computer Science, 2Department of Industrial Technology. Purdue University Goals & Advantages: Bio-Key Lifecycle: • The goal is to provide a privacy preserving methodology for strong biometric authentication in federated identity management systems. • Privacy Preserving Multifactor Authentication [1]: multifactor authentication is essential for secure authentication mechanisms. The identity management framework is used to provide proofs of multiple strong identifiers for a given user. • Interoperability: Our scheme provides an interoperable, usable, secure, and inexpensive to use biometric authentication in a federation. • User Control : The raw biometric never leaves the client machine therefore providing complete control to its owner. Bio-Key Transformation: ID Attributes: • Sensor / Raw Image / Feature Extraction / Vector Creation Collaboration Through CERIAS: • Department of Computer Science • Biometric Standards, Performance & Assurance (BSPA) Laboratory (Department of Industrial Technology) Reference: [1] A. B. Spantzel, A. C. Squicciarini, E. Bertino. Establishing and Protecting Digital Identity in Federation System. In proceedings of ACM CCS workshop on Digital Identity Management . 239-522.pdf 1 3/5/2007 2:32:34 PM